Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)
☆21Oct 18, 2024Updated last year
Alternatives and similar repositories for DetectCobaltStrike
Users that are interested in DetectCobaltStrike are comparing it to the libraries listed below
Sorting:
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- ☆26Apr 24, 2025Updated 10 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆15Jul 13, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- 小玩具,用来快 速检测银狐家族恶意程序,和部分RAT/C2产品☆68Jan 7, 2025Updated last year
- ☆13Sep 14, 2023Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Mar 4, 2023Updated 3 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- ☆26Apr 10, 2023Updated 2 years ago
- 一个简单的批量反编译jar包的小脚本☆45Mar 20, 2022Updated 3 years ago
- ☆59Oct 17, 2024Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴等☆21Jan 1, 2023Updated 3 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆161Oct 27, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆63Jun 25, 2025Updated 8 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆185Oct 29, 2025Updated 4 months ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- ☆99Sep 20, 2021Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- APT-GUID☆23Oct 23, 2020Updated 5 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆186Jun 23, 2025Updated 8 months ago
- proxy/tunnel everything for red team!☆235May 27, 2025Updated 9 months ago